Authentication protocol for cloud databases using blockchain mechanism G Deep, R Mohana, A Nayyar, P Sanjeevikumar, E Hossain Sensors 19 (20), 4444, 2019 | 65 | 2019 |
Digital 3D barcode image as a container for data hiding using steganography R Rani, G Deep 2017 4th International Conference on Signal Processing, Computing and …, 2017 | 15 | 2017 |
IoT-Based brinjal crop monitoring system N Kaur, G Deep Smart Sensors for Industrial Internet of Things: Challenges, Solutions and …, 2021 | 5 | 2021 |
Review Paper on Data Hiding In 3D Barcode Image Using Steganography. R Rani, GD Sharma International Journal of Advanced Research in Computer Science 8 (5), 2017 | 5 | 2017 |
Cluster based image steganography using pattern matching C Singh, G Deep small 5, 6, 2013 | 4 | 2013 |
Insider threat prevention in distributed database as a service cloud environment G Deep, J Sidhu, R Mohana Computers & Industrial Engineering 169, 108278, 2022 | 3 | 2022 |
Role of Indian IT laws in smart healthcare devices in the intensive care unit in India G Deep, J Sidhu, R Mohana 2020 Sixth International Conference on Parallel, Distributed and Grid …, 2020 | 3 | 2020 |
HSI color space conversion steganography using elliptic curve G Kaur, EG Deep International Journal of Innovations and Advancement in Computer Science 4 …, 2015 | 3 | 2015 |
Padding Byte Stuffing: A Technique to Hide Data in MP3 N Sharma, G Deep International Journal of Innovations & Advancement in Computer Science 4 (6 …, 2015 | 2 | 2015 |
Level's 4 Security in Image Steganography H Kaur, G Deep International Journal of Computer Applications 121 (23), 2015 | 2 | 2015 |
To Study Scope Of Data Hiding In Various Image Color Models G Kaur, EGD Deep International Journal For Technological Research In Engineering 2 (9), 2027-2029, 2015 | 2 | 2015 |
Comparison of various video steganography techniques R Gaba, G Deep Ritej et al./IJAIR 2 (6), 2013 | 2 | 2013 |
MRI Medical Image and Steganography G Singh, G Deep International Journal of Modern Computer Science (IJMCS) Volume 4, 0 | 2 | |
Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain G Deep, J Sidhu, R Mohana Scalable Computing: Practice and Experience 21 (3), 407-424, 2020 | 1 | 2020 |
Statistical approach for detecting distributed denial of service attacks R Gauravdeep Asian Journal of Computer Science and Information Technology, 85-89, 2017 | 1 | 2017 |
Comparison of active queue management in ns2 MMG Deep Asian Journal of Computer Science and Information Technology, 79-84, 2017 | 1 | 2017 |
Review Paper on Digital X-Ray Image and Steganography M Gaurav deep http://nebula.wsimg.com/3061a8f74f6de55a17f2cee4b172823d?AccessKeyId …, 2017 | 1* | 2017 |
Data-hiding in 2D Barcode using Steganography P Sidhu, G Deep Research Cell: An International Journal of Engineering Sciences 22, 440-446, 2016 | 1 | 2016 |
To Study Scope of Data Hiding in MP3 Files N Sharma, EG Deep International Journal of Science, Engineering and Computer Technology 5 (6), 138, 2015 | 1 | 2015 |
Distributed PEP–PDP Architecture for Cloud Databases G Deep, J Sidhu, R Mohana Wireless Personal Communications 128 (3), 1733-1761, 2023 | | 2023 |